1 / 21

Introduction to Modern Cryptography Lecture 7

Introduction to Modern Cryptography Lecture 7 RSA Public Key CryptoSystem One way Trapdoor Functions. Diffie and Hellman (76) “New Directions in Cryptography”. Split the Bob’s secret key K to two parts: K E , to be used for encrypting messages to Bob .

eacosta
Download Presentation

Introduction to Modern Cryptography Lecture 7

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Modern Cryptography Lecture 7 RSA Public Key CryptoSystem One way Trapdoor Functions

  2. Diffie and Hellman (76)“New Directions in Cryptography” Split the Bob’s secret key K to two parts: • KE , to be used for encrypting messages to Bob. • KD , to be used for decrypting messages by Bob. KE can be made public (public key cryptography, assymetric cryptography)

  3. Integer Multiplication & Factoring as a One Way Function. easy p,q N=pq hard Q.: Can a public key system be based on this observation ?????

  4. Excerpts from RSA paper (CACM, 1978) The era of “electronic mail” may soon be uopn us; we must ensure that two important properties of the current “paper mail” system are preserved: (a) messages are private, and (b) messages can be signed. We demonstrate in this paper how to build these capabilities into an electronic mail system. At the heart of our proposal is a new encryption method. This method provides an implementation of a “public-key cryptosystem,” an elegant concept invented by Diffie and Hellman. Their article motivated our research, since they presented the concept but not any practical implementation of such system.

  5. The Multiplicative GroupZpq* Let p and q be two large primes. Denote their product N = pq . The multiplicative group ZM* =Zpq* contains all integers in the range [1,pq-1] that are relatively prime to both p and q. The size of the group is (pq) = (p-1) (q-1) = N - (p+q) + 1, so for every x Zpq*,x(p-1)(q-1) = 1.

  6. Exponentiation in Zpq* Motivation: We want to exponentiationfor encryption. Let e be an integer, 1 < e < (p-1) (q-1). Question: When is exponentiation to the eth power, x--> xe, a one-to-one op in Zpq* ?

  7. Exponentiation in Zpq* Claim: If e is relatively prime to (p-1)(q-1) then x--> xeis a one-to-one op in Zpq* Constructive proof: Since gcd(e, (p-1)(q-1))=1, e has a multiplicative inverse mod (p-1)(q-1). Denote it by d,then ed=1 + C(p-1)(q-1). Let y=xe, thenyd =(xe)d=x1+C(p-1)(q-1) =x meaning y --> ydis the inverse of x-->xe QED

  8. RSA Public Key Cryptosystem • Let N=pq be the product of two primes • Choose e such that gcd(e,(N))=1 • Let d be such that de1 mod (N) • The public key is (N,e) • The private key is d • Encryption of MZN* by C=E(M)=Me mod N • Decryption of CZN* by M=D(C)=Cd mod N “The above mentioned method should not be confused with the exponentiation technique presented by Diffie and Hellman to solve the key distribution problem”.

  9. Constructing an instance of RSA PKC • Alice first picks at random two large primes, p and q. • Alice then picks at random a larged that is relatively prime to (p-1)(q-1) ( gcd(d,(N))=1 ). • Alice computese such that de1 mod (N) • Let N=pq be the product of p and q. • Alice publishes the public key (N,e). • Alice keeps the private key d, as well as the primes p, qand the number (N), in a safe place.

  10. A Small Example • Let p=47, q=59, N=pq=2773. (N)= 46*58=2668. Pickd=157, then 157*17 - 2668 =1, so e=17 is the inverse of 157 mod 2668. For N =2773 we can encode two letters per Block, using a two digit number per letter: blank=00, A=01,B=02,…,Z=26. Message: ITS ALL GREEK TO ME is encoded 0920 1900 0112 1200 0718 0505 1100 2015 0013 0500

  11. A Small Example N=2773, e=17 (10001 in binary). ITS ALL GREEK TO ME is encoded as 0920 1900 0112 1200 0718 0505 1100 2015 0013 0500 First block M=0920 encrypts to Me= M17 = (((M2)2 )2 )2 * M = 948 (mod 2773) The whole message (10 blocks) is encrypted as 0948 2342 1084 1444 2663 2390 0778 0774 0219 1655 Indeed 0948d=0948157=920 (mod 2773), etc.

  12. RSA as a One Way Trapdoor Function. easy x xe mod N hard Easy with trapdoor info ( d )

  13. Trap-Door OWF • Definition: f:DR is a trap-door one way function if there is a trap-door s such that: • Without knowledge of s, the function f is a one way function • Given s, inverting f is easy • Example: fg,p(x) = gx mod p is not a trap-door one way function. • Example: RSA is a trap-door OWF.

  14. Attacks on RSA • FactorN=pq. This is believed hard unless p, q have some “bad” properties. To Avoid such primes, it is recommended to • Take p, q large enough (100 digits each). • Make sure p, q are not tooclose together. • Make sureboth(p-1), (q-1)have large prime factors (to foil Pollard’s rho algorithm).

  15. Basic Scheme • A public key encryption scheme includes the following elements: • A private key k • A public key k’ • An encryption algorithm, which is a trap door OWF. The trap-door info is the private key • Public key is published • Encryption uses the public key (anyone can encrypt) • Decryption requires the private key

  16. Properties of RSA • The requirement (e,(n))=1 is important for uniqueness • Finding d, given p and q is easy. Finding d given only n and e is assumed to be hard (the RSA assumption) • The public exponent e may be small. Typically its value is either 3 (problematic) or 216+1 • Each encryption involves several modular multiplications. Decryption is longer.

  17. El-Gamal Encryption • Constructed by El-Gamal in 1985 • Similar to DH • Alice publishes p, g as public parameters • Alice chooses x as a private key and publishes gx mod p as a public key • Encryption of mZp by sending (gy mod p, mgxy mod p) or (gy mod p, m+gxy mod p) • Requires two exponentiations per each block transmitted.

  18. Real World usage Two words: Key Exchange

  19. Digital Signatures

  20. Model • A public key analog of MAC • A digital signature scheme includes the following elements: • A private key k • A public key k’ • A signature algorithm • Public key is published • Signature requires private key • Verification requires public key

  21. Ramifications • Commercial – anyone can sign a contract, check, statement etc. • Signatures are necessary for e-commerce • Legal – digital signatures can be binding in a court of law (unlike MACs) • Legal signature laws of various types are appearing

More Related